Oh, so you stop hackers and stuff?

What I’d like touch on today with this post is a common misconception about data encryption and security. When I tell people who I work for and what we do, many people assume what we do is protect people from hackers. If people use our software the various security breaches people hear about would be prevented. I’d like to say that we could prevent any kind of hacks etc. but it simply isn’t true.

Even if we were the data encryption solution of choice for companies like Sony, LinkedIn and others, we couldn’t have stopped the ‘hackers’ that breached their systems. What we do is protect data at rest, information that resides on a hard drive or other storage media. We prevent bad guys from accessing the information on these devices if they’re ever lost or stolen by ensuring they can’t log on to the system and any other attempts to access the data is unsuccessful because well… it’s encrypted.

If a hacker (in the sense that they breach a secure network to gain access to devices) accesses a live server or device via the network there’s nothing that can be done from an encryption standpoint. Once a device has been logged-in to, it’s open. All information is visible because the proverbial keys to the front door have been used and it’s unlocked.

Stopping hackers from those types of breaches is about network and OS security. Ensuring there aren’t loopholes in your network infrastructure that can allow them to gain access through backdoors and other exploits that take advantage of OS vulnerabilities.

However, if bad guys were to steal an encrypted laptop from the back of your car, there’s a lot we could do to prevent them from reading any of the data on that device. That device is turned off and has to be booted and someone has to provide credentials to authenticate themselves to gain access to the information on it. A bad guy isn’t going to have that information. If encryption is used and the added layer of pre-boot authentication is added to the boot process, it’s nearly impossible for that hacker to gain access to the data.

If the hard drive is removed and put in a different computer, it’s still encrypted. It still needs user authentication to gain access. With an encryption solution in place with pre-boot authentication, a stolen laptop becomes a very large door stop for the bad guy that stole it. There are also other technologies that can enable us to remotely wipe the device and track it.

With that in mind, the most common issue when devices are lost or stolen is that the device isn’t encrypted. We recently commissioned a study by the Ponemon Institute where companies reported that 33% of lost laptops have unencrypted information. If it’s not encrypted, it’s not secure. If it’s not secure, your business, customers, reputation and integrity are at risk.

The Site is open to the public. Therefore, consider your comments carefully and do not include anything in a comment that you would like to keep private. By uploading or otherwise making available any information to WinMagic in the form of user generated comments or otherwise, you grant Winmagic the unlimited, perpetual right to distribute, display, publish, reproduce, reuse and copy the information contained therein.

You are responsible for the content you post. You may not impersonate any other person through the blog. You may not post content that is obscene, defamatory, threatening, fraudulent, invasive of another person’s privacy rights, or is otherwise unlawful. You may not post content that infringes the intellectual property rights of any other person or entity. You may not post any content that contains any computer viruses or any other code designed to disrupt, damage, or limit the functioning of any computer software or hardware.

By submitting or posting content on the blog, you grant WinMagic and any company substantially under its control, the right to remove any content or comment that, in WinMagic’s sole judgment, does not comply with the posting guideline, the terms of this website or is otherwise objectionable. You also grant WinMagic and any company substantially under its control the right to modify, adapt, and edit any content.

Your use of this blog is subject to the terms of use of the website on which this blog is hosted blog.winmagic.com. Because WinMagic values your thoughtful opinions, we encourage you to add a comment to this discussion. However, please don’t be offended if we edit your comments for clarity or to keep out questionable matters, and we may even delete off-topic comments. Any opinions expressed within the blog are those of the author and not necessarily held by WinMagic itself. The information on this blog may be changed without notice and is not guaranteed to be complete, correct, timely, current or up-to-date. Similar to any printed materials, the information on this blog may become out-of-date. Winmagic undertakes no obligation to update any information on the blog; provided, however, that WinMagic may update the information on this blog at any time without notice in WinMagic’s sole and absolute discretion.